A Pattern-Based Method for Identifying and Analyzing Laws

Size: px
Start display at page:

Download "A Pattern-Based Method for Identifying and Analyzing Laws"

Transcription

1 A Pattern-Based Method for Identifying and Analyzing Laws Kristian Beckers, Stephan Faßbender, Jan-Christoph Küster, and Holger Schmidt paluno - The Ruhr Institute for Software Technology University of Duisburg-Essen {firstname.lastname}@paluno.uni-due.de Australian National University, Canberra, Australia Jan-Christoph.Kuester@anu.edu.au Abstract. This paper presents a novel method for identifying and analyzing laws. The method makes use of different kinds of law analysis patterns that allow legal experts and software and system developers to understand and elicit relevant laws for the given development problem. Our approach also helps to detect dependent laws. We illustrate our method using an online-banking cloud scenario. 1 Introduction Identifying relevant compliance regulations for a software system and aligning it to be compliant is a challenging task.the construction of software systems that meet compliance regulations, such as laws, is considered to be difficult, because it is a crossdisciplinary task in laws and software and systems engineering [1]. Otto and Antón [2] conclude in their survey about research on laws in requirements engineering that there is a need for techniques to identify and analyze laws, and to derive requirements from laws. We present a pattern-based method for identifying and analyzing laws. We introduce law analysis patterns that allow legal experts and software developers to understand and elicit laws that are relevant for a given development problem. In this paper, we consider compliance in the field of cloud computing systems (or short clouds) as an example domain, because using clouds to store and manage critical data and to support sensitive IT processes harbors several problems with respect to compliance. We illustrate our approach using the example of a bank offering an onlinebanking service for their customers. Customer data such as account number, balance, and transaction history are stored in the cloud, and transactions like credit transfer are processed in the cloud. The bank authorizes the software department to design and build the cloud-specific software according to the interface and platform specification of the cloud provider.for simplicity s sake, we focus in our running example on relevant compliance regulations for privacy. In 1995, the European Union (EU) adopted the Directive 95/46/EC on the processing of personal data that represents the minimum This research was partially supported by the EU project Network of Excellence on Engineering Secure Future Internet Software Services and Systems (NESSoS, ICT Trustworthy ICT, Grant No ).

2 2 Authors Suppressed Due to Excessive Length privacy standards that have to be included in every national law. Germany implements the European Privacy Directive in the Federal Data Protection Act (BDSG). The rest of the paper is organized as follows: We present patterns to deal with laws in requirements engineering in Sect. 2. Then, in Sect. 3, we discuss related work. In Sect. 4, we give a summary and directions for future research. 2 Pattern-Based Law Analysis Commonly, laws are not adequately considered during requirements engineering. Therefore, they are not covered in the subsequent system development phases. One fundamental reason for this is that the involved engineers are typically not cross-disciplinary experts in law and software and systems engineering. Hence, we present in this section a pattern-based approach to systematically consider laws in the requirements engineering process. For our method we chose the German law as the binding law. However, we believe that our law identification and analysis method is also valid for laws of other nations. 2.1 Structure of Laws, Sections and Dictates of Justice The German law is a statute law in the tradition of the Roman jurisdiction. Statute laws are specified by the legislator and written down in legal documents. Hence, every judgment of a court is based exclusively on the analysis of the legal documents relevant for the judged case [3, p. 41]. We analyzed, how judges and lawyers are supposed to analyze a law, based upon legal literature research. These insights lead to a basic structure of laws which we used to create law patterns. We describe the results of this analysis in the following. First of all a law is a textual document. This law document is structured into sections. Each section defines a legal aspect of the law and contains several statements. These statements are dictates of justice, so-called legal rules [4, p. 240]. There are different types of dictates of justice. Complete and self-containing dictates of justice are one type. This type is the fundamental building block of every law [4, p. 241]. We derived the following structure of complete and self-containing dictates of justice. A * next to an element of the structure means the element is optional. Addressee(s) describe(s) actions that an addressee has to follow or avoid to be compliant Facts of the case Activity(ies) describe(s) actions that an addressee has to follow or avoid to be compliant. Target subject(s)* describes impersonal subjects that are objectives of the activity(ies).subjects can be material, such as a product, or immaterial, such as information. Target person(s)* are directly influenced by the activity(ies) of an addressee, or have a relation to the target subject(s). Legal consequence defines the consequence for an addressee, e.g. the punishment when violating the section.

3 Identifying and Analyzing Laws 3 A dictate of justice is divided into the facts of the case, the setting which is regulated, and the legal consequence, the resulting implications of the setting [5, p. 7]. Furthermore, a dictate of justice has also an addressee(s). The reason is that every complete dictate of justice is an imperative, or can be transformed into an imperative [4, p ], and an imperative has to be directed towards an addressee(s) [3, p. 3-4]. The facts of the case need to be further refined to be useful for a pattern. The legal method called subsumption contains a further refinement of the facts of the case [4, p ]. This refinement results in the basic elements activities, target subjects, and target persons [5, p ]. Lawyers use the subsumption to analyze if a dictate of justice is applicable to a specific case. The case is described in terms and notions. Lawyers map these to the notions and terms describing the basic elements [3, p ]. If not all terms and notions of the case can be mapped to basic elements, the dictate of justice is not relevant for the case. However, a mapping between all terms and notions of the case and the basic elements is not sufficient to prove the relevance of a dictate of justice for a case. The reason is that the facts of the case of the dictate of justice can contain an element that has no mapping to a term or notion of the specific case. The subsumption solely considers a mapping from the term or notion of the specific case to the dictate of justice. The other direction is not considered. Moreover, such an element has the potential to prove that the law is not relevant for the specific case. The subsumption provides this gap intentionally, because the mapping of specific cases to laws is based upon human interpretation. Besides the complete, self-containing dictates there are [4, p ] definition dictates that describe and refine terms and other basic elements, restricting dictates, which add exceptions to a complete dictate, directing dictates, which reference one or more other dictates, and fiction dictates, which equate different facts of the case. These dictates cannot be analyzed in isolation. All of them have relations to other dictates (or even laws). The types of relation between these dictates are refinement, addition, and constraint. This implies that all of resulting dictates and laws, and the relations between them, have to be considered when analyzing laws. A regulation is the set of rules applicable to a specific case [4, p. 254]. Thus, relations between laws, sections and dictates of justice are of fundamental importance. They are arranged in a hierarchy, which is not always free of conflicts [4, p. 255]. A special part of these relations is the terminology used within a jurisdiction. This terminology is organized as hierarchical tree where the terms and notions of the more general dictates of justices are refined by subsequent dictates of justice. 2.2 A Process for Identifying relevant Laws Our general process for identifying relevant laws consists of five steps. For this process law experts and software engineers have to work together for the necessary knowledge transfer. Step one can be done alone by legal experts and for step two only software engineers are needed. But in step three and four both groups are needed to bridge the gap between legal and technical world. The last step can be accomplished alone by legal experts.

4 4 Authors Suppressed Due to Excessive Length Step 1: Law Pattern Based on the previously discussed structure of laws, we define a law pattern shown on the upper left-hand side of Fig. 1. The pattern consists of three parts: the dark grey part represents the Law Structure, the light gray part depicts the to consider the specialization of the elements contained in the Law Structure in related laws or sections, and the white part considers the. We organize the mentioned hierarchies by Person Classifier, Activity Classifier, and Subject Classifier using hierarchies. Figure 2 shows example instances for all three hierarchies according to BDSG. The part of the law pattern contains the Legislator(s) defining the jurisdiction, and the Domain(s) clarifying for which domain the law was established. As it is necessary to know in which context and relation a law is used, we introduce Regulation(s), which are the section at hand. Regulation(s), Legislator(s), and Domain(s) can be ordered in hierarchies, similar to classifiers. For instance, Germany is part of the EU and consists of several states. We now describe the instantiation process for our law pattern using Section 4b BDSG as an example. We explained the importance of this particular law in Sect. 1. Section 4b BDSG regulates the abroad transfer of data. The resulting instance is shown on the right-hand side of Fig. 1. Our process starts based on the first sections of the law to be analyzed. These sections are self-contained, i.e. they define all necessary elements of our Law Structure. Additionally, the Legislator(s) and Domain(s) can be instantiated according to the considered law (e.g. Germany and General Public in the part). Given a section of a law not yet captured by our law pattern, we identify and document the related laws and sections referred to by the given section (e.g. BDSG Sec. 1 in the part). Then, we search for the Law Structure directly defined in this section. In Section 4b BDSG, we find Abroad Transfer, and we use it to instantiate Activity(ies). Addressee(s), Target Subject(s), and Target Person(s) are not defined in Section 4b BDSG. Law Section BDSG Sec. 4b Regulation(s) BDSG Sec. 1 Legislator(s) Domain(s) Person Classifier Mentioned Or Defined In Activity Classifier Subject Classifier Mentioned Or Defined In Mentioned Or Defined In General Public Germany Authority Natural Mentioned In Person BDSG Sec. 1 Transfer Data Defined In Avoid / Accomplish Activity(ies) Target Subject(s) Addressee(s) Law Structure Target Person(s) Avoid / Abroad Accomplish Transfer Private Bodies Law Structure Personal Data Individual Requirement Activity Scalable Data Storing Store Distributed Legislator(s) Core Structure Domain(s) Avoid / Accomplish Active Stakeholder(s) Activity Classifier Defined Or Mentioned In Activity Person Classifier Defined Or Mentioned In Subject Classifier Defined Or Mentioned In Asset(s) Requirement(s) Related Process(es) Passive Stakeholder(s) Legislator Domain EU Finance Legislator US Legislator Legal Entity Individual Germany Mentioned In Mentioned In BDSG Sec. 2 BDSG Sec. 2 Storage Abroad Transfer Personal Data BDSG Sec. 4b Hulda Core Structure Avoid / Accomplish Store Distributed Cloud API Customer Data Offering Data Storing Bank Customer Fig. 1. Law Pattern (upper left) and Instance (upper right), Law Identification Pattern (lower left) and Instance (lower right)

5 Identifying and Analyzing Laws 5 Data Automated Processing Personal Data Introduced In Individual Introduced In BDSG Sec. 2 Natural Person Introduced In BDSG Sec. 2 Private Body Introduced In BDSG Sec. 1 Legal Entity Introduced In BDSG Sec. 2 Storage BDSG Sec.3 Transfer Introduced In Abroad Transfer Introduced In BDSG Sec. 4b Fig. 2. Examples for Person (left), Subject (middle), and Activity (right) Hierarchies Therefore, related sections defining these terms have to be discovered. In our example, we find Private Bodies for the Addressee(s), Personal Data for the Target Subject(s), and Individual for the Target Person(s) in Section 1 BDSG (according to BDSG Sec. 1 in the part). We arrange these specializations in the appropriate parts of the hierarchies in Fig. 2. The classifier is instantiated with the parent node of the corresponding hierarchy, which is for instance Transfer, defined in Section 3 BDSG, for Abroad Transfer. Step 2: Law Identification Pattern Identifying relevant laws based on functional requirements is difficult, because functional requirements are usually too imprecise, they contain important information only implicitly and use a different wording than in laws. To bridge between gap of the wording and to facilitate the discussion between requirements engineers and legal experts, we define a law identification pattern to support identifying relevant laws Figure 1 shows on the lower left-hand side our law identification pattern. The structure is similar to the law pattern on the upper left side of Fig. 1 to allow a matching of instances of both patterns. In contrast to the legal vocabulary used in the Law Structure of our law pattern, the wording for the elements in the dark gray colored Core Structure of our law identification pattern is based on terms known from requirements engineering. For example, the element Asset(s) in our law identification pattern represents the element Target Subject(s) in our law pattern. Our law identification pattern takes into account that requirements are often interdependent (Requirement(s) in the part). Given a law relevant to a requirement, the same law might be relevant to the dependent requirements, too. Furthermore, the pattern helps to document similar dependencies for a given Activity using the Related Process(es) in the part. As our example on the lower right-hand side of Fig. 1 shows, we select Hulda as the cloud provider, then we choose the functional requirement Scalable Data Storing. One of the activities associated with this requirement is the activity Store Distributed, which refers to the asset Customer Data of the Bank Customer. Moreover, we instantiate the elements Legislator(s) and Domain(s). In our example on the lower right side of Fig. 1, we include the legislators Germany, US, EU, and the domain Finance. In addition, we discover the related requirement Cloud API and the process Offering Data Storing, and document them in the instance of our law identification pattern. Step 3: Establishing the Relation between Laws and Requirements To instantiate the part, legal expertise is necessary. According to the Core Structure of the instance of our law identification pattern and the hierarchies built when instantiating our law pattern, legal experts classify the elements of the Core Structure. For example, the

6 6 Authors Suppressed Due to Excessive Length activity Store Distributed is classified as Abroad Transfer based on a discussion between the legal experts and software engineers. Step 4: Deriving relevant Laws The identification of relevant laws is based on matching the classification part of the law identification pattern instance (light gray part) with the law structure and classification part of the law pattern instance (light and dark gray parts), and thereby considering the previously documented hierarchies. If all elements match, the law is identified as relevant. For example, we find direct matches in the law pattern instance depicted on right side of Fig. 1 for the elements Abroad Transfer, Personal Data, and Individual contained in the law identification pattern instance shown on the lower right side of Fig. 1. Hulda is classified as Legal Entity and the only element that does not directly match with Private Bodies in the law structure of Section 4b BDSG. In this case, the hierarchy in Fig. 2 helps to identify that Legal Entity is a specialization of Private Bodies, and thus, we identify Section 4b BDSG as relevant. Finally, we check for all laws identified to be relevant if Legislator(s) and Domain(s) are mutually exclusive. In our example, the legislator Germany contained in of the law pattern instance depicted on lower right side of Fig. 1 can be found in of the law identification pattern instance shown on the lower right side of Fig. 1. The domain General Public in the law pattern instance can be considered as a generalization of the domain Finance in the law identification pattern instance. The resulting set of laws relevant for the given development problem serves as an input for the next step. Step 5: This last step covers the identification and specification of requirements based on laws identified to be relevant by our approach, e.g. using existing approaches such as the one from Breaux et al. [6]. 3 Related Work Breaux et al. [6] present a framework that covers analyzing the structure of laws using a natural language pattern. This pattern helps to translate laws into a more structured The approach has some drawbacks of formal logic analysis of laws we will discuss later in this section. Siena et al. [7] describe the differences between legal concepts and requirements. The resulting process to align legal concepts to requirements and the given concepts are quite high level and cannot directly be applied to a scenario. In contrast to our approach they do not identify relevant laws and do not intertwine compliance regulations with already elicited requirements. Álvarez et al. [8] describe reusable legal requirements in natural language. We believe that the work by Álvarez et al. complements our work, i.e., applying our law identification method can precede using their security requirements templates. Bench-Capon et al. [9] make use of first order logic to model regulations. In contrast to our work, the authors assume that the relevant laws are already known. 4 Conclusions We presented a pattern-based method for identifying and analyzing laws, which can be embedded in common system and software development processes. The novelty about

7 Identifying and Analyzing Laws 7 our approach is that we analyzed common methods lawyers use to identify and analyze laws. We captured this knowledge in patterns. We derived this pattern-based approach from the subsumption method, while other approaches use formal logic to formalize and analyze laws. Logic-based approaches seem to be more precise. However, legislators formulate laws imprecise by design [4, 3, 5, p , p , p ]. Hence, we decided to capture the modus operandi from lawyers in a pattern-based method. Biagioli et al. investigated Italian law and derived also a structure of dictates of justice, which is very similar to the structure presented in this work. [1, p. 247]. Thus, it is likely that the pattern is also applicable to further laws in the tradition of the Roman jurisdiction. The case law system, in the US or Great Britain, is another important legal system. We plan to adapt our method for the case law system, via case patterns that extend law patterns. We also aim to work on tool support for our approach, e.g. to store, load, and search for laws once they have been fitted to our law patterns. The tool support will be used for validation of our method. We are planning to use our approach on the entire BDSG, which has 48 sections. We estimate around 4 patterns are required per section on average, which will lead to a result of around 200 patterns for the entire law. Acknowledgements We thank Maritta Heisel and Christoph Sorge for their extensive and valuable feedback on our work. References 1. Biagioli, C., Mariani, P., Tiscornia, D.: Esplex: A rule and conceptual model for representing statutes. In: Proceedings of the 1st international conference on Artificial intelligence and law. ICAIL 87, ACM (1987) Otto, P.N., Antón, A.I.: Addressing legal requirements in requirements engineering. In: Proceedings of the International Conference on Requirements Engineering (RE), IEEE Computer Society (2007) Schwacke, P.: Juristische Methodik mit Technik der Fallbearbeitung. 4. edn. Kohlhammer Deutscher Gemeindeverlag (2003) 4. Larenz, K.: Methodenlehre der Rechtswissenschaft. 5. edn. Springer (1983) 5. Beaucamp, G., Treder, L.: Methoden und Techniken der Rechtsanwendung. 2. edn. C.F.Müller (2011) 6. Breaux, T.D., Antón, A.I.: Analyzing regulatory rules for privacy and security requirements. IEEE Transactions on Software Engineering 34(1) (2008) Siena, A., Perini, A., Susi, A.: From laws to requirements. In: Proceedings of the International Workshop on Requirements Engineering and Law (RELAW), IEEE Computer Society (2008) Álvarez, J.A.T., Olmos, A., Piattini, M.: Legal requirements reuse: A critical success factor for requirements quality and personal data protection. In: Proceedings of the International Conference on Requirements Engineering (RE), IEEE Computer Society (2002) Bench-Capon, T., Robinson, G., Routen, T., Sergot, M.: Logic programming for large scale applications in law: A formalization of supplementary benefit legislation. In: Proceedings of the International Conference on Artificial Intelligence and Law (ICAIL), ACM (1987)

An integrated Method for Pattern-based Elicitation of Legal Requirements applied to a Cloud Computing Example

An integrated Method for Pattern-based Elicitation of Legal Requirements applied to a Cloud Computing Example An integrated Method for Pattern-based Elicitation of Legal Requirements applied to a Cloud Computing Example Kristian Beckers,Stephan Faßbender paluno - The Ruhr Institute for Software Technology University

More information

On Efficient Collaboration between Lawyers and Software Engineers when Transforming Legal Regulations to Law-related Requirements

On Efficient Collaboration between Lawyers and Software Engineers when Transforming Legal Regulations to Law-related Requirements Proceedings of the 2n d International Conference on Information Technology, ICIT 2010 28-30 June 2010, Gdansk, Poland. On Efficient Collaboration between Lawyers and Software Engineers when Transforming

More information

A Pattern-based Method for Establishing a Cloud-specific Information Security Management System

A Pattern-based Method for Establishing a Cloud-specific Information Security Management System Noname manuscript No. (will be inserted by the editor) A Pattern-based Method for Establishing a -specific Information Security Management System Establishing Information Security Management Systems for

More information

Pattern-based Context Establishment for Service-Oriented Architectures

Pattern-based Context Establishment for Service-Oriented Architectures Pattern-based Context Establishment for -Oriented Architectures Kristian Beckers, Stephan Faßbender, Maritta Heisel, and Rene Meis paluno - The Ruhr Institute for Software Technology - University of Duisburg-Essen,

More information

A Structured Comparison of Security Standards

A Structured Comparison of Security Standards A Structured Comparison of Security Standards Kristian Beckers 1, Isabelle Côté 3, Stefan Fenz 2, Denis Hatebur 1,3, and Maritta Heisel 1 1 paluno - The Ruhr Institute for Software Technology - University

More information

Business Process and Regulations Compliance Management Technology

Business Process and Regulations Compliance Management Technology Business Process and Regulations Compliance Management Technology Ilze Buksa Riga Technical University, Institute of Applied Computer Systems, Meza street 1/4, LV-1048, Riga, Latvia ilze.buksa@rtu.lv Supervisor

More information

Security and Compliance in Clouds

Security and Compliance in Clouds Security and Compliance in Clouds Pattern-Based Compliance and Security Requirements Engineering Martin Hirsch, Jan Jürjens, Jan-Christoph Küster Fraunhofer Institut für Software- und Systemtechnologie

More information

Privacy-Aware Cloud Deployment Scenario Selection

Privacy-Aware Cloud Deployment Scenario Selection Privacy-Aware Cloud Deployment Scenario Selection Kristian Beckers 1, Stephan Faßbender 1, Stefanos Gritzalis 2, Maritta Heisel 1, Christos Kalloniatis 3, and Rene Meis 1 1 paluno - The Ruhr Institute

More information

The Role of Law in Software Requirements Engineering

The Role of Law in Software Requirements Engineering The Role of Law in Software Requirements Engineering Paul Otto Advisor: Annie Antón CSC 890 Written Qualifier Exam Why should computer scientists study the law? Regulatory compliance is the primary driver

More information

Managing and Tracing the Traversal of Process Clouds with Templates, Agendas and Artifacts

Managing and Tracing the Traversal of Process Clouds with Templates, Agendas and Artifacts Managing and Tracing the Traversal of Process Clouds with Templates, Agendas and Artifacts Marian Benner, Matthias Book, Tobias Brückmann, Volker Gruhn, Thomas Richter, Sema Seyhan paluno The Ruhr Institute

More information

A Framework for Software Product Line Engineering

A Framework for Software Product Line Engineering Günter Böckle Klaus Pohl Frank van der Linden 2 A Framework for Software Product Line Engineering In this chapter you will learn: o The principles of software product line subsumed by our software product

More information

SERENITY Pattern-based Software Development Life-Cycle

SERENITY Pattern-based Software Development Life-Cycle SERENITY Pattern-based Software Development Life-Cycle Francisco Sanchez-Cid, Antonio Maña Computer Science Department University of Malaga. Spain {cid, amg}@lcc.uma.es Abstract Most of current methodologies

More information

Internationalization Processes for Open Educational Resources

Internationalization Processes for Open Educational Resources Internationalization Processes for Open Educational Resources Henri Pirkkalainen 1, Stefan Thalmann 2, Jan Pawlowski 1, Markus Bick 3, Philipp Holtkamp 1, Kyung-Hun Ha 3 1 University of Jyväskylä, Global

More information

A Structured Method for Security Requirements Elicitation concerning the Cloud Computing Domain

A Structured Method for Security Requirements Elicitation concerning the Cloud Computing Domain A Structured Method for Security Requirements Elicitation concerning the Cloud Computing Domain Kristian Beckers 1, Maritta Heisel 1, Isabelle Côté 2, Ludger Goeke 2, Selim Güler 3 1 paluno - The Ruhr

More information

Towards Collaborative Requirements Engineering Tool for ERP product customization

Towards Collaborative Requirements Engineering Tool for ERP product customization Towards Collaborative Requirements Engineering Tool for ERP product customization Boban Celebic, Ruth Breu, Michael Felderer, Florian Häser Institute of Computer Science, University of Innsbruck 6020 Innsbruck,

More information

Separating Compliance Management and Business Process Management

Separating Compliance Management and Business Process Management Separating Compliance Management and Business Process Management Elham Ramezani 1, Dirk Fahland 2, Jan Martijn van der Werf 2, and Peter Mattheis 1 1 Hochschule Furtwangen, Germany (ramezani Peter.Mattheis)@hs-furtwangen.de

More information

Ubiquitous, Pervasive and Mobile Computing: A Reusable-Models-based Non-Functional Catalogue

Ubiquitous, Pervasive and Mobile Computing: A Reusable-Models-based Non-Functional Catalogue Ubiquitous, Pervasive and Mobile Computing: A Reusable-Models-based Non-Functional Catalogue Milene Serrano 1 and Maurício Serrano 1 1 Universidade de Brasília (UnB/FGA), Curso de Engenharia de Software,

More information

A terminology model approach for defining and managing statistical metadata

A terminology model approach for defining and managing statistical metadata A terminology model approach for defining and managing statistical metadata Comments to : R. Karge (49) 30-6576 2791 mail reinhard.karge@run-software.com Content 1 Introduction... 4 2 Knowledge presentation...

More information

11 Tips to make the requirements definition process more effective and results more usable

11 Tips to make the requirements definition process more effective and results more usable 1 11 Tips to make the s definition process more effective and results more usable This article discusses what I believe are the key techniques for making s definition process repeatable from project to

More information

Using i for Transformational Creativity in Requirements Engineering

Using i for Transformational Creativity in Requirements Engineering Using i for Transformational Creativity in Requirements Engineering Sushma Rayasam and Nan Niu Department of EECS, University of Cincinnati Cincinnati, OH, USA 45221 rayasasa@mail.uc.edu, nan.niu@uc.edu

More information

Requirements and compliance in legal systems: a logic approach

Requirements and compliance in legal systems: a logic approach Requirements and compliance in legal systems: a logic approach Waël Hassan 1 Luigi Logrippo 1,2 1 University of Ottawa, 2 Université du Québec en Outaouais wael@acm.org, luigi@uqo.ca Abstract It is shown

More information

How To Develop Software

How To Develop Software Software Engineering Prof. N.L. Sarda Computer Science & Engineering Indian Institute of Technology, Bombay Lecture-4 Overview of Phases (Part - II) We studied the problem definition phase, with which

More information

Prioritizing Legal Requirements

Prioritizing Legal Requirements Prioritizing Legal Requirements Aaron K. Massey, Paul N. Otto,, and Annie I. Antón Department of Computer Science, North Carolina State University School of Law, Duke University {akmassey, pnotto, aianton}@ncsu.edu

More information

Personal data and cloud computing, the cloud now has a standard. by Luca Bolognini

Personal data and cloud computing, the cloud now has a standard. by Luca Bolognini Personal data and cloud computing, the cloud now has a standard by Luca Bolognini Lawyer, President of the Italian Institute for Privacy and Data Valorization, founding partner ICT Legal Consulting Last

More information

ONTOLOGY FOR MOBILE PHONE OPERATING SYSTEMS

ONTOLOGY FOR MOBILE PHONE OPERATING SYSTEMS ONTOLOGY FOR MOBILE PHONE OPERATING SYSTEMS Hasni Neji and Ridha Bouallegue Innov COM Lab, Higher School of Communications of Tunis, Sup Com University of Carthage, Tunis, Tunisia. Email: hasni.neji63@laposte.net;

More information

Position of leading German business organisations

Position of leading German business organisations Bundesverband des Deutschen Groß- und Außenhandels March 2007 Position of leading German business organisations on Commission staff working document European Credit system for Vocational Education and

More information

Overview of major concepts in the service oriented extended OeBTO

Overview of major concepts in the service oriented extended OeBTO Modelling business policies and behaviour based on extended Open edi Business Transaction Ontology (OeBTO) Introduction Model Driven Development (MDD) provides a basis for the alignment between business

More information

Model-Based Requirements Engineering with AutoRAID

Model-Based Requirements Engineering with AutoRAID Model-Based Requirements Engineering with AutoRAID Bernhard Schätz, Andreas Fleischmann, Eva Geisberger, Markus Pister Fakultät für Informatik, Technische Universität München Boltzmannstr. 3, 85748 Garching,

More information

A Metadata-based Approach to Leveraging the Information Supply of Business Intelligence Systems

A Metadata-based Approach to Leveraging the Information Supply of Business Intelligence Systems University of Augsburg Prof. Dr. Hans Ulrich Buhl Research Center Finance & Information Management Department of Information Systems Engineering & Financial Management Discussion Paper WI-325 A Metadata-based

More information

Ontology Modeling Using UML

Ontology Modeling Using UML Ontology Modeling Using UML Xin Wang Christine W. Chan Department of Computer Science, University of Regina, Regina, Saskatchewan, Canada S4S 0A2 wangx@cs.uregina.ca, chan@cs.uregina.ca Abstract Ontology

More information

Ontology for Home Energy Management Domain

Ontology for Home Energy Management Domain Ontology for Home Energy Management Domain Nazaraf Shah 1,, Kuo-Ming Chao 1, 1 Faculty of Engineering and Computing Coventry University, Coventry, UK {nazaraf.shah, k.chao}@coventry.ac.uk Abstract. This

More information

Briefly summarised, SURFmarket has submitted the following questions to the Dutch DPA:

Briefly summarised, SURFmarket has submitted the following questions to the Dutch DPA: UNOFFICIAL TRANSLATION Written opinion on the application of the Wet bescherming persoonsgegevens [Dutch Data Protection Act] in the case of a contract for cloud computing services from an American provider

More information

INFORMATION MANAGEMENT STRATEGIC FRAMEWORK GENERAL NAT 11852-08.2004 OVERVIEW

INFORMATION MANAGEMENT STRATEGIC FRAMEWORK GENERAL NAT 11852-08.2004 OVERVIEW GENERAL OVERVIEW NAT 11852-08.2004 SEGMENT FORMAT PRODUCT ID INFORMATION MANAGEMENT STRATEGIC FRAMEWORK In the context of the Information Management Strategic Framework, information is defined as: information

More information

Chapter 4 Software Lifecycle and Performance Analysis

Chapter 4 Software Lifecycle and Performance Analysis Chapter 4 Software Lifecycle and Performance Analysis This chapter is aimed at illustrating performance modeling and analysis issues within the software lifecycle. After having introduced software and

More information

Requirements Analysis Concepts & Principles. Instructor: Dr. Jerry Gao

Requirements Analysis Concepts & Principles. Instructor: Dr. Jerry Gao Requirements Analysis Concepts & Principles Instructor: Dr. Jerry Gao Requirements Analysis Concepts and Principles - Requirements Analysis - Communication Techniques - Initiating the Process - Facilitated

More information

Improving Traceability of Requirements Through Qualitative Data Analysis

Improving Traceability of Requirements Through Qualitative Data Analysis Improving Traceability of Requirements Through Qualitative Data Analysis Andreas Kaufmann, Dirk Riehle Open Source Research Group, Computer Science Department Friedrich-Alexander University Erlangen Nürnberg

More information

The term IFRS is used as a hypernym for Full IFRS and IFRS for SMEs. 2

The term IFRS is used as a hypernym for Full IFRS and IFRS for SMEs. 2 Foundation 1 1 Foundation 1.1 Introduction 1.1.1 Motivation Which countries have actually adopted Full IFRS and IFRS for SMEs in the field of private firms and why have they done so? At a first glance,

More information

A Recommendation Framework Based on the Analytic Network Process and its Application in the Semantic Technology Domain

A Recommendation Framework Based on the Analytic Network Process and its Application in the Semantic Technology Domain A Recommendation Framework Based on the Analytic Network Process and its Application in the Semantic Technology Domain Student: Filip Radulovic - fradulovic@fi.upm.es Supervisors: Raúl García-Castro, Asunción

More information

Frequently Asked Questions

Frequently Asked Questions Integrated Planning & Reporting Framework Frequently Asked Questions and their answers August 2009 Question Why are the planning and reporting requirements for local councils being changed? Page 3 What

More information

Using AWS in the context of Australian Privacy Considerations October 2015

Using AWS in the context of Australian Privacy Considerations October 2015 Using AWS in the context of Australian Privacy Considerations October 2015 (Please consult https://aws.amazon.com/compliance/aws-whitepapers/for the latest version of this paper) Page 1 of 13 Overview

More information

How To Use Networked Ontology In E Health

How To Use Networked Ontology In E Health A practical approach to create ontology networks in e-health: The NeOn take Tomás Pariente Lobo 1, *, Germán Herrero Cárcel 1, 1 A TOS Research and Innovation, ATOS Origin SAE, 28037 Madrid, Spain. Abstract.

More information

Lightweight Data Integration using the WebComposition Data Grid Service

Lightweight Data Integration using the WebComposition Data Grid Service Lightweight Data Integration using the WebComposition Data Grid Service Ralph Sommermeier 1, Andreas Heil 2, Martin Gaedke 1 1 Chemnitz University of Technology, Faculty of Computer Science, Distributed

More information

A Scala DSL for Rete-based Runtime Verification

A Scala DSL for Rete-based Runtime Verification A Scala DSL for Rete-based Runtime Verification Klaus Havelund Jet Propulsion Laboratory California Institute of Technology, California, USA Abstract. Runtime verification (RV) consists in part of checking

More information

Complying with Law for RE in the Automotive Domain

Complying with Law for RE in the Automotive Domain Complying with Law for RE in the Automotive Domain Birgit Penzenstadler penzenst@in.tum.de Technische Universität München Fakultät für Informatik Software & Systems Engineering 85748 Garching, Germany

More information

Ontology based Recruitment Process

Ontology based Recruitment Process Ontology based Recruitment Process Malgorzata Mochol Radoslaw Oldakowski Institut für Informatik AG Netzbasierte Informationssysteme Freie Universität Berlin Takustr. 9, 14195 Berlin, Germany mochol@inf.fu-berlin.de

More information

A HUMAN RESOURCE ONTOLOGY FOR RECRUITMENT PROCESS

A HUMAN RESOURCE ONTOLOGY FOR RECRUITMENT PROCESS A HUMAN RESOURCE ONTOLOGY FOR RECRUITMENT PROCESS Ionela MANIU Lucian Blaga University Sibiu, Romania Faculty of Sciences mocanionela@yahoo.com George MANIU Spiru Haret University Bucharest, Romania Faculty

More information

Test Coverage Criteria for Autonomous Mobile Systems based on Coloured Petri Nets

Test Coverage Criteria for Autonomous Mobile Systems based on Coloured Petri Nets 9th Symposium on Formal Methods for Automation and Safety in Railway and Automotive Systems Institut für Verkehrssicherheit und Automatisierungstechnik, TU Braunschweig, 2012 FORMS/FORMAT 2012 (http://www.forms-format.de)

More information

Implementation of hybrid software architecture for Artificial Intelligence System

Implementation of hybrid software architecture for Artificial Intelligence System IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.1, January 2007 35 Implementation of hybrid software architecture for Artificial Intelligence System B.Vinayagasundaram and

More information

Thesis Summary: An Ontology for City Logistics

Thesis Summary: An Ontology for City Logistics Thesis summary This report contains the detailed course of designing an ontology that formalises the domain knowledge of City Logistics and then facilitates relevant agent-based modelling. Validation,

More information

Towards a Comprehensive Design-time Compliance Management: A Roadmap

Towards a Comprehensive Design-time Compliance Management: A Roadmap Towards a Comprehensive Design-time Management: A Roadmap Amal Elgammal, Ph.D. Candidate, Tilburg, The Netherlands, a.f.s.a.elgammal@uvt.nl Oktay Turetken, Post-doc Researcher, Tilburg, The Netherlands,

More information

EU Project N MARKT/2007/15/F LOT 2

EU Project N MARKT/2007/15/F LOT 2 EU Project N MARKT/2007/15/F LOT 2 Evaluation of the differences between International Standards on Auditing (ISA) and the standards of the US Public Company Accounting Oversight Board (PCAOB) Maastricht

More information

Acquia Comments on EU Recommendations for Data Processing in the Cloud

Acquia Comments on EU Recommendations for Data Processing in the Cloud Acquia Comments on EU Recommendations for Data Processing in the Cloud Executive Summary On July 1, 2012, European Union (EU) data protection regulators provided guidelines for service providers processing

More information

White Paper. Business Analysis meets Business Information Management

White Paper. Business Analysis meets Business Information Management White Paper BABOK v2 & BiSL Business Analysis meets Business Information Management Business Analysis (BA) and Business Information Management (BIM) are two highly-interconnected fields that contribute

More information

Healthcare systems make effective use of IT

Healthcare systems make effective use of IT SETLabs Briefings September 2008 IT Applications for Healthcare: Leverage Processes for High Quality By Ravishankar N An integrated process framework derived from industry models can help address compliance,

More information

Chapter 8 The Enhanced Entity- Relationship (EER) Model

Chapter 8 The Enhanced Entity- Relationship (EER) Model Chapter 8 The Enhanced Entity- Relationship (EER) Model Copyright 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 8 Outline Subclasses, Superclasses, and Inheritance Specialization

More information

Goal-Based Self-Contextualization

Goal-Based Self-Contextualization Goal-Based Self-Contextualization Raian Ali, Fabiano Dalpiaz Paolo Giorgini University of Trento - DISI, 38100, Povo, Trento, Italy {raian.ali, fabiano.dalpiaz, paolo.giorgini}@disi.unitn.it Abstract.

More information

MedView: A Declarative Approach to Evidence-Based Medicine

MedView: A Declarative Approach to Evidence-Based Medicine MedView: A Declarative Approach to Evidence-Based Medicine Göran Falkman Department of Computer Science, University of Skövde, P.O. Box 408, SE 541 28 Skövde, Sweden Olof Torgersson Department of Computing

More information

Value-based models for ontology-driven, legal risk management and compliance

Value-based models for ontology-driven, legal risk management and compliance Value-based models for ontology-driven, legal risk management and compliance Robert Muthuri University of Torino robert.kiriinya@unito.it Abstract. In this paper, we motivate how value-based modelling

More information

An Integrated Quality Assurance Framework for Specifying Business Information Systems

An Integrated Quality Assurance Framework for Specifying Business Information Systems An Integrated Quality Assurance Framework for Specifying Business Information Systems Frank Salger 1, Stefan Sauer 2, Gregor Engels 1,2 1 Capgemini sd&m AG, Carl-Wery-Str. 42, D-81739 München, Germany

More information

estatistik.core: COLLECTING RAW DATA FROM ERP SYSTEMS

estatistik.core: COLLECTING RAW DATA FROM ERP SYSTEMS WP. 2 ENGLISH ONLY UNITED NATIONS STATISTICAL COMMISSION and ECONOMIC COMMISSION FOR EUROPE CONFERENCE OF EUROPEAN STATISTICIANS Work Session on Statistical Data Editing (Bonn, Germany, 25-27 September

More information

Please quote as: Hoffmann, A.; Schulz, T.; Hoffmann, H.; Jandt, S.; Roßnagel, A. & Leimeister, J. (2012): Towards the Use of Software Requirement

Please quote as: Hoffmann, A.; Schulz, T.; Hoffmann, H.; Jandt, S.; Roßnagel, A. & Leimeister, J. (2012): Towards the Use of Software Requirement Please quote as: Hoffmann, A.; Schulz, T.; Hoffmann, H.; Jandt, S.; Roßnagel, A. & Leimeister, J. (2012): Towards the Use of Software Requirement Patterns for Legal Requirements. In: 2nd International

More information

EU CUSTOMS BUSINESS PROCESS MODELLING POLICY

EU CUSTOMS BUSINESS PROCESS MODELLING POLICY EUROPEAN COMMISSION MASP Revision 2014 v1.1 ANNEX 4 DIRECTORATE-GENERAL TAXATION AND CUSTOMS UNION Customs Policy, Legislation, Tariff Customs Processes and Project Management Brussels, 03.11.2014 TAXUD.a3

More information

Efficiently Managing Firewall Conflicting Policies

Efficiently Managing Firewall Conflicting Policies Efficiently Managing Firewall Conflicting Policies 1 K.Raghavendra swamy, 2 B.Prashant 1 Final M Tech Student, 2 Associate professor, Dept of Computer Science and Engineering 12, Eluru College of Engineeering

More information

Guideline. Records Management Strategy. Public Record Office Victoria PROS 10/10 Strategic Management. Version Number: 1.0. Issue Date: 19/07/2010

Guideline. Records Management Strategy. Public Record Office Victoria PROS 10/10 Strategic Management. Version Number: 1.0. Issue Date: 19/07/2010 Public Record Office Victoria PROS 10/10 Strategic Management Guideline 5 Records Management Strategy Version Number: 1.0 Issue Date: 19/07/2010 Expiry Date: 19/07/2015 State of Victoria 2010 Version 1.0

More information

A Mind Map Based Framework for Automated Software Log File Analysis

A Mind Map Based Framework for Automated Software Log File Analysis 2011 International Conference on Software and Computer Applications IPCSIT vol.9 (2011) (2011) IACSIT Press, Singapore A Mind Map Based Framework for Automated Software Log File Analysis Dileepa Jayathilake

More information

Competency Framework

Competency Framework South Australian Public Sector FIRST LINE MANAGER Competency Framework First Line Manager Competencies for the SA Public Sector 1 First Line Manager Competencies for the SA Public Sector What is the purpose

More information

Data-Aware Service Choreographies through Transparent Data Exchange

Data-Aware Service Choreographies through Transparent Data Exchange Institute of Architecture of Application Systems Data-Aware Service Choreographies through Transparent Data Exchange Michael Hahn, Dimka Karastoyanova, and Frank Leymann Institute of Architecture of Application

More information

Bringing agility to Business Intelligence Metadata as key to Agile Data Warehousing. 1 P a g e. www.analytixds.com

Bringing agility to Business Intelligence Metadata as key to Agile Data Warehousing. 1 P a g e. www.analytixds.com Bringing agility to Business Intelligence Metadata as key to Agile Data Warehousing 1 P a g e Table of Contents What is the key to agility in Data Warehousing?... 3 The need to address requirements completely....

More information

Trust-Aware Decision-Making Methodology for Cloud Sourcing

Trust-Aware Decision-Making Methodology for Cloud Sourcing F. Moyano, K. Beckers, and C. Fernandez-Gago, Trust-Aware Decision-Making Methodology for Cloud Sourcing, 26th International Conference on Advanced Information Systems Engineering (CAiSE 2014), LCNS vol.

More information

APPLICATION OF A SALES-TOOL FOR AN OPTIMIZED TENDER PREPARATION IN SMALL AND MEDIUM-SIZED COMPANIES

APPLICATION OF A SALES-TOOL FOR AN OPTIMIZED TENDER PREPARATION IN SMALL AND MEDIUM-SIZED COMPANIES URN (Paper): urn:nbn:de:gbv:ilm1-2011iwk-014:9 56 TH INTERNATIONAL SCIENTIFIC COLLOQUIUM Ilmenau University of Technology, 12 16 September 2011 URN: urn:nbn:gbv:ilm1-2011iwk:5 APPLICATION OF A SALES-TOOL

More information

Data Validation with OWL Integrity Constraints

Data Validation with OWL Integrity Constraints Data Validation with OWL Integrity Constraints (Extended Abstract) Evren Sirin Clark & Parsia, LLC, Washington, DC, USA evren@clarkparsia.com Abstract. Data validation is an important part of data integration

More information

Business Analytics, Big Data, and the Cloud

Business Analytics, Big Data, and the Cloud Strategy Business Analytics, Big Data, and the Cloud Regulatory requirements when mining information treasure 14 Detecon Management Report 3 / 2012 Business Analytics, Big Data, and the Cloud Björn Froese

More information

White Paper Take Control of Datacenter Infrastructure

White Paper Take Control of Datacenter Infrastructure Take Control of Datacenter Infrastructure Uniting the Governance of a Single System of Record with Powerful Automation Tools Take Control of Datacenter Infrastructure A new breed of infrastructure automation

More information

IMPROVING RISK VISIBILITY AND SECURITY POSTURE WITH IDENTITY INTELLIGENCE

IMPROVING RISK VISIBILITY AND SECURITY POSTURE WITH IDENTITY INTELLIGENCE IMPROVING RISK VISIBILITY AND SECURITY POSTURE WITH IDENTITY INTELLIGENCE ABSTRACT Changing regulatory requirements, increased attack surfaces and a need to more efficiently deliver access to the business

More information

Winery A Modeling Tool for TOSCA-based Cloud Applications

Winery A Modeling Tool for TOSCA-based Cloud Applications Institute of Architecture of Application Systems Winery A Modeling Tool for TOSCA-based Cloud Applications Oliver Kopp 1,2, Tobias Binz 2, Uwe Breitenbücher 2, and Frank Leymann 2 1 IPVS, 2 IAAS, University

More information

Background: Business Value of Enterprise Architecture TOGAF Architectures and the Business Services Architecture

Background: Business Value of Enterprise Architecture TOGAF Architectures and the Business Services Architecture Business Business Services Services and Enterprise and Enterprise This Workshop Two parts Background: Business Value of Enterprise TOGAF s and the Business Services We will use the key steps, methods and

More information

A Variability Viewpoint for Enterprise Software Systems

A Variability Viewpoint for Enterprise Software Systems 2012 Joint Working Conference on Software Architecture & 6th European Conference on Software Architecture A Variability Viewpoint for Enterprise Software Systems Matthias Galster University of Groningen,

More information

Software Engineering Transfer Degree

Software Engineering Transfer Degree www.capspace.org (01/17/2015) Software Engineering Transfer Degree This program of study is designed for associate-degree students intending to transfer into baccalaureate programs awarding software engineering

More information

A Framework for the Delivery of Personalized Adaptive Content

A Framework for the Delivery of Personalized Adaptive Content A Framework for the Delivery of Personalized Adaptive Content Colm Howlin CCKF Limited Dublin, Ireland colm.howlin@cckf-it.com Danny Lynch CCKF Limited Dublin, Ireland colm.howlin@cckf-it.com Abstract

More information

Component visualization methods for large legacy software in C/C++

Component visualization methods for large legacy software in C/C++ Annales Mathematicae et Informaticae 44 (2015) pp. 23 33 http://ami.ektf.hu Component visualization methods for large legacy software in C/C++ Máté Cserép a, Dániel Krupp b a Eötvös Loránd University mcserep@caesar.elte.hu

More information

Microsoft Business Analytics Accelerator for Telecommunications Release 1.0

Microsoft Business Analytics Accelerator for Telecommunications Release 1.0 Frameworx 10 Business Process Framework R8.0 Product Conformance Certification Report Microsoft Business Analytics Accelerator for Telecommunications Release 1.0 November 2011 TM Forum 2011 Table of Contents

More information

STANDARD FOR AUDITING PROJECTS DEFINITIONS AND RULES

STANDARD FOR AUDITING PROJECTS DEFINITIONS AND RULES Deutsches Institut für Interne Revision e.v. (German Institute for Internal Auditing) DIIR Audit Standard No. 4 STANDARD FOR AUDITING S DEFINITIONS AND RULES DIIR Project Management Audit Project Group

More information

Ten steps to better requirements management.

Ten steps to better requirements management. White paper June 2009 Ten steps to better requirements management. Dominic Tavassoli, IBM Actionable enterprise architecture management Page 2 Contents 2 Introduction 2 Defining a good requirement 3 Ten

More information

Please quote as: Berkovich, M.; Leimeister, J. M.; Hoffmann, A. & Krcmar, H. (2012): A requirements data model for product service systems.

Please quote as: Berkovich, M.; Leimeister, J. M.; Hoffmann, A. & Krcmar, H. (2012): A requirements data model for product service systems. Please quote as: Berkovich, M.; Leimeister, J. M.; Hoffmann, A. & Krcmar, H. (2012): A data model for product service systems. In: Engineering, Ausgabe/Number: 2, Vol. 19, Erscheinungsjahr/Year: 2012.

More information

Quantitative restrictions on imports and all measures having equivalent effect shall be prohibited between Member States.

Quantitative restrictions on imports and all measures having equivalent effect shall be prohibited between Member States. The Legal Helpdesk Support Schemes and Free Movement Law An overview over the latest developments Dr. Dörte Fouquet, Rechtsanwältin, Partner, BBH Jana Viktoria Nysten, LL.M., Advocaat, Attorney at law,

More information

Deploying Artificial Intelligence Techniques In Software Engineering

Deploying Artificial Intelligence Techniques In Software Engineering Deploying Artificial Intelligence Techniques In Software Engineering Jonathan Onowakpo Goddey Ebbah Department of Computer Science University of Ibadan Ibadan, Nigeria Received March 8, 2002 Accepted March

More information

The SPES Methodology Modeling- and Analysis Techniques

The SPES Methodology Modeling- and Analysis Techniques The SPES Methodology Modeling- and Analysis Techniques Dr. Wolfgang Böhm Technische Universität München boehmw@in.tum.de Agenda SPES_XT Project Overview Some Basic Notions The SPES Methodology SPES_XT

More information

Improving self-regulation through (law-based) Corporate Data Protection Officials *

Improving self-regulation through (law-based) Corporate Data Protection Officials * Improving self-regulation through (law-based) Corporate Data Protection Officials * Article by Christoph Klug ** The rise of globalization and multinational corporations is creating a pressing need for

More information

Growing a database through Contact Gap Analysis & Discovery

Growing a database through Contact Gap Analysis & Discovery CASE STUDY: Growing a database through Gap Analysis & Discovery WWW.OCEANOSINC.COM LIST 1.781.804.1010 INTELLIGENCE Challenge In order to increase marketing reach within the human resources (HR) function,

More information

Regulatory Compliance and its Impact on Software Development

Regulatory Compliance and its Impact on Software Development Regulatory Compliance and its Impact on Software Development Abdelwahab Hamou-Lhadj Software Compliance Research Group Department of Electrical and Computer Engineering Concordia University 1455 de Maisonneuve

More information

Exploring Architectural Design Decision Management Paradigms for Global Software Development

Exploring Architectural Design Decision Management Paradigms for Global Software Development Exploring Architectural Design Decision Management Paradigms for Global Software Development Meiru Che, Dewayne E. Perry Department of Electrical & Computer Engineering The University of Texas at Austin

More information

Orchestrating an SOA with Rules

Orchestrating an SOA with Rules Orchestrating an SOA with Rules Bright*Star Service-Oriented Architecture & Web Services Conference Mark Norton 17 February 2004 The keyword is SERVICE - but what does it mean?? loosely coupled services,

More information

The European Union as a Constitutional Guardian of Internet Privacy and Data Protection: the Story of Article 16 TFEU

The European Union as a Constitutional Guardian of Internet Privacy and Data Protection: the Story of Article 16 TFEU The European Union as a Constitutional Guardian of Internet Privacy and Data Protection: the Story of Article 16 TFEU SHORT SUMMARY There is a wide perception that governments are losing control over societal

More information

Reusable Knowledge-based Components for Building Software. Applications: A Knowledge Modelling Approach

Reusable Knowledge-based Components for Building Software. Applications: A Knowledge Modelling Approach Reusable Knowledge-based Components for Building Software Applications: A Knowledge Modelling Approach Martin Molina, Jose L. Sierra, Jose Cuena Department of Artificial Intelligence, Technical University

More information

Network Analysis of Regulations

Network Analysis of Regulations Why Eliciting and Managing Legal Requirements Is Hard Nadzeya Kiyavitskaya University of Trento nadzeya@disi.unitn.it Alžběta Krausová ICRI - K. U. Leuven - IBBT betty.krausova@law.kuleuven.be Nicola Zannone

More information

Linking BPMN, ArchiMate, and BWW: Perfect Match for Complete and Lawful Business Process Models?

Linking BPMN, ArchiMate, and BWW: Perfect Match for Complete and Lawful Business Process Models? Linking BPMN, ArchiMate, and BWW: Perfect Match for Complete and Lawful Business Process Models? Ludmila Penicina Institute of Applied Computer Systems, Riga Technical University, 1 Kalku, Riga, LV-1658,

More information

Written Contribution of the National Association of Statutory Health Insurance Funds of 16.11.2015

Written Contribution of the National Association of Statutory Health Insurance Funds of 16.11.2015 Written Contribution of the National Association of Statutory Health Insurance Funds of 16.11.2015 to the Public Consultation of the European Commission on Standards in the Digital : setting priorities

More information

Collision of subsidiary clauses in insurance contracts

Collision of subsidiary clauses in insurance contracts Dr. Anja Mayer Versicherungspraxis, June 2014 Insurance contract law Collision of subsidiary clauses in insurance contracts Insurance contracts often contain subsidiary clauses. Theses clauses have the

More information

Cloud deployment model and cost analysis in Multicloud

Cloud deployment model and cost analysis in Multicloud IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) ISSN: 2278-2834, ISBN: 2278-8735. Volume 4, Issue 3 (Nov-Dec. 2012), PP 25-31 Cloud deployment model and cost analysis in Multicloud

More information

A Pattern-based Approach to Business Process Modeling and Implementation in Web Services

A Pattern-based Approach to Business Process Modeling and Implementation in Web Services A Pattern-based Approach to Business Process Modeling and Implementation in Web Services Steen Brahe 1 and Behzad Bordbar 2 1 Danske Bank & IT University of Copenhagen, Denmark stbr@itu.dk 2 University

More information